PDF View Scientific Computing and Imaging (SCI) Institute The Scientific Computing…
Docs
PDF View In order to facilitate a centralized and shared compute…
PDF View Evans Conference Room (WEB 3780)…
This page describes how to clear your browsers data (including cookies) step by step for all major browsers. This can be useful if you are being blocked from viewing content due to the campus firewall.
In addition to the standard UConnect, UIT provides a Wi-Fi network vlan for SCI Users. SCI-UConnect comes with the added…
Most licensed software that is used by people in SCI are obtained through the University’s Office Of Software Licensing(OSL), including Microsoft’s O365, Adobe, Matlab, etc. Please refer to the OSL site for what software is available and how to obtain it.
Data lies at the heart of almost everything we do in the computing world, and there are a myriad of attributes that are important in figuring where to store data and how to access it. To enable SCI users to best manage their data, SCI IT provides a number of different data storage locations. This document details those locations and their features.
Modern computer systems are very robust and SCI IT has infrastructure in place to ensure that all hosts stay up, functional, and available to use, 24×7. However, maximizing uptime also requires regular maintenance, which includes the regular patching, updating, and rebooting of machines, which impacts their availability as well as the services running on them. Additionally, no infrastructure is 100% reliable and sometimes, despite best efforts, unexpected downtime occurs.
All Unix hosts in SCI are set up to use SSH by default, so you can easily connect to them by simply ssh’ing into them using your preferred client. SSH is unrestricted within the UofU network, which also includes any machines connected via the campus VPN. When coming from outside of the UofU network, however, access is limited to shell.sci.utah.edu only, as restricting what we expose to the outside world makes it much harder for attackers to find ways of exploiting our systems and enables us to more quickly identify, respond to, and remediate threats.
This article describes the steps for setting up a printer connection with any printer in the building from a windows OS